Encryption software is a very important part of security infrastructure, but it is not the only part. Both Kryptel and Silver Key provide a very high level of data protection, but if you wrote your password on a post-it and stuck it to your monitor, the security level would be zero no matter how strong encryption was. No encryption software can guarantee that your data is safe – it is just a tool that requires some understanding and skill.
Choosing a quality hacking-resistant password is not as simple as it sounds, and this article may give you a few useful hints. The article contains practical recommendations, covering three most important how-tos: how to choose, how to use, and how not to lose.
A short introduction into binary keys. Binary key is usually kept on a flash stick and is used instead of password – just plug it in.
This article gives you some insight into data shredding – what is it and why do you need it. You will also find a few useful tips there.
Exactly what the title says: an introduction. Nothing new here for experienced users, but if you are new to encryption, this article can make the picture clearer.
Describes special installation methods, useful mainly in multi-user environment.
This article describes special techiques for system administrators who need to configure the software for mass deployment or server-side processing.
Quick introduction to basic Kryptel functions for new Kryptel users.
How-to on creating and scheduling encrypted backup.
How-to for recovering data from a corrupted container using Kryptel Data Recovery.
Describes installing and using Kryptel (Kryptelite) plug-in for Total Commander. The plug-in component allows accessing Kryptel containers and Kryptel encrypted backups directly in the Total Commander panes.
Silver Key-related Articles
Quick how-to for new Silver Key users.
A tool for transparent file exchange via popular Web storage services.
Uploading Silver Key parcels to Web storage.
Signing Silver Key parels: how to obtain and how to use digital certificates.
If you or your correspondent use an old version of Silver Key: possible issues and how to solve them.
A brief introduction. What is Yubikey and what do you get by using a hardware key.
A guide to obtaining and setting up a new Yubikey.
Using Yubikeys for individuals and workgroups.
Creating and managing pre-created Yubikey lists.
Describes in detail how to create a custom virtual keyboard.
How to localize Kryptel or Silver Key into another language.
The purpose of these articles is to provide information on internal data formats for public scrutiny. At least a basic understanding of programming is required.
An introduction to Kryptel storage model, required for understanding other technical articles.
Structure of standard Kryptel 6 container.
Structure of Kryptel 7 container.
Structure of FIPS 140-2 -compliant Kryptel container.
Specifications of Kryptel File Agent and Kryptel Backup Agent.
Format of Silver Key parcel.
Format of Silver Key FIPS 140-2 parcel.
Encrypted stream is a basic encryption building block. This article describes how a block of source data is converted to an encrypted form.
Describes the format of Kryptel key file.
Provides full details on how Kryptel and Silver Key work with hardware Yubikeys.